A survey on gait recognition

C Wan, L Wang, VV Phoha - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Recognizing people by their gait has become more and more popular nowadays due to the
following reasons. First, gait recognition can work well remotely. Second, gait recognition …

A survey on brain biometrics

Q Gui, MV Ruiz-Blondet, S Laszlo, Z Jin - ACM Computing Surveys …, 2019 - dl.acm.org
Brainwaves, which reflect brain electrical activity and have been studied for a long time in
the domain of cognitive neuroscience, have recently been proposed as a promising …

Sok: Authentication in augmented and virtual reality

S Stephenson, B Pal, S Fan… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Augmented reality (AR) and virtual reality (VR) devices are emerging as prominent
contenders to today's personal computers. As personal devices, users will use AR and VR to …

Behavioural biometrics in VR: Identifying people from body motion and relations in virtual reality

K Pfeuffer, MJ Geiger, S Prange, L Mecke… - Proceedings of the …, 2019 - dl.acm.org
Every person is unique, with individual behavioural characteristics: how one moves,
coordinates, and uses their body. In this paper we investigate body motion as behavioural …

EarEcho: Using ear canal echo for wearable authentication

Y Gao, W Wang, VV Phoha, W Sun, Z Jin - Proceedings of the ACM on …, 2019 - dl.acm.org
Smart wearable devices have recently become one of the major technological trends and
been widely adopted by the general public. Wireless earphones, in particular, have seen a …

A review on protection and cancelable techniques in biometric systems

JC Bernal-Romero, JM Ramirez-Cortes… - Ieee …, 2023 - ieeexplore.ieee.org
An essential part of cloud computing, IoT, and in general the broad field of digital systems, is
constituted by the mechanisms which provide access to a number of services or …

PPGPass: Nonintrusive and secure mobile two-factor authentication via wearables

Y Cao, Q Zhang, F Li, S Yang… - IEEE INFOCOM 2020 …, 2020 - ieeexplore.ieee.org
Mobile devices are promising to apply two-factor authentication in order to improve system
security and enhance user privacy-preserving. Existing solutions usually have certain limits …

[PDF][PDF] OcuLock: Exploring human visual system for authentication in virtual reality head-mounted display

S Luo, A Nguyen, C Song, F Lin, W Xu… - 2020 Network and …, 2020 - par.nsf.gov
The increasing popularity of virtual reality (VR) in a wide spectrum of applications has
generated sensitive personal data such as medical records and credit card information …

Velody: Nonlinear vibration challenge-response for resilient user authentication

J Li, K Fawaz, Y Kim - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
Biometrics have been widely adopted for enhancing user authentication, benefiting usability
by exploiting pervasive and collectible unique characteristics from physiological or …

Blinkey: A two-factor user authentication method for virtual reality devices

H Zhu, W Jin, M Xiao, S Murali, M Li - … of the ACM on Interactive, Mobile …, 2020 - dl.acm.org
Virtual Reality (VR) has shown promising potentials in many applications, such as e-
business, healthcare, and social networking. Rich information regarding user's activities and …